Abstract
A policy mechanism of pseudonym exchange was established in VANET. The group signature is introduced as the identity attribute tag of the message which be used as a supplement to pseudonym. A white list mechanism is also proposed to avoid generate huge storage and cancellation overhead in the pseudonym signature scheme. The security and performance analysis show that the proposed protocol is feasible. In the storage overhead, authentication speed and robustness are superior to the traditional scheme. However, the increase of message length has little effect on packet loss rate and end-to-end delay. Compared to its performance in privacy protection and saving computational overhead, these effects can be ignored.
Supported in part by Science and Technology Cooperation Program of Guizhou Province, China under Grant LH20157763, in part by Science and technology plan project of Ministry of Housing and Urban-Rural Development, China under Grant 2016-K3-009.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(11), 1–43 (2015)
Mokhtar, B., Azab, M.: Survey on security issues in vehicular ad hoc networks. AEJ – Alex. Eng. J. 54(4), 1115–1126 (2015)
Mohammed, N.H.A., El-Moafy, H.N., Abdel-Mageid, S.M., et al.: Mobility management scheme based on smart buffering for vehicular networks. Int. J. Comput. Netw. Appl. 4(2), 35–46 (2017)
Liu, X., Zhang, Y., Wang, B., et al.: Mona: secure multi-owner data sharing for dynamic groups in the Cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)
Joe, M.M., Ramakrishnan, B.: Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. Wirel. Netw. 22(7), 1–18 (2015)
Raya, M., Hubaux, J.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39–68 (2007)
Haas, J., Hu, Y., Laberteaux, K.: Design and analysis of a lightweight certificate revocation mechanism for VANET. In: Proceedings of 6th ACM International Workshop on Vehicular Inter-networking, New York, pp. 89–98 (2009)
Lin, X., Sun, X., Ho, P.H., et al.: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6), 3442–3456 (2007)
Dedicated short range communications (DSRC) [EB/OL] (2011). http://grouper.ieee.org/groups/scc32/dsrc/index.html
Freudiger, J., Raya, M., Félegyházi, M., et al.: Mix-zones for location privacy in vehicular networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (2007)
Zhu, X., Donghui, H., Hou, Z., et al.: A location privacy preserving solution to resist passive and active attacks in VANET. China Commun. 11(9), 60–67 (2014)
Dahl, M., Delaune, S., Steel, G.: Formal analysis of privacy for vehicular mix-zones. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 55–70. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15497-3_4
Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: PETS 2009, 216–234 (2009)
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_3
Hao, Y., Cheng, Yu., Chi, Z., et al.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616–629 (2011)
Jung, Y.H., Li, Q.: Short dynamic group signature scheme supporting controllable linkabilityp. IEEE Trans. Inf. Forensics Secur. 32(6), 1–14 (2013)
Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: AMOEBA: robust location privacy scheme for VANET. IEEE J. Sel. Areas Commun. 25(8), 1569–1589 (2007)
Liu, Z., Liu, J., Wu, Q., et al.: Secure and efficient distributed pseudonym generation in VANET. J. Commun. 36(11), 33–40 (2015)
Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, pp. 171–178. ACM (2006)
Li, M., Sampigethaya, K., Huang, L., et al.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proceedings of ACM WPES, pp. 19–28 (2006)
Lin, X., Sun, X., Wang, X., et al.: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wirel. Commun. 7(12), 4987–4998 (2009)
Zeng, S., Huang, Y., Liu, X.: Privacy-preserving communication for VANETs with conditionally anonymous ring signature. Int. J. Netw. Secur. 17(2), 135–141 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, Y., Wang, Z., Huang, L., Xie, X. (2018). Modeling and Analysis of a Hybrid Authentication Protocol for VANET. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)